chapter 2 Flashcards

1
Q

what are the roles in data collection and data publishing

A

Data Recipient
Data Publisher
Record Owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

an example of data recipient

A

Medical Center
(data mining)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an example of data Publisher

A

Hospital
(data anonymization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an example of record owners

A

patients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the data attributes

A

Explicit Identifier

Quasi Identifier (QID)

Sensitive Attributes

Non-Sensitive Attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are explicit identifiers

A

Data attributes that explicitly identifies record owners, e.g., name, identity card number, mobile phone number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are Quasi Identifier (QID)

A

Data attributes that could potentially identify record owners, e.g., postal code, age, gender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are sensitive attributes

A

Data attributes that are sensitive person-specific information, e.g., salary, disease, disability status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are non sensitive attributes

A

Data attributes that do not fall into all of the other categories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the roles responsible with data collection

A

data publisher

record owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the roles responsible for data publishing

A

data receipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the privacy attacks

A

record linkage

attribute linkage

table linkage

probabilistic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the record linkage model

A
  • Similar Quasi Identifier (QID) values grouped into small number of records
  • Victim’s QID matches and linked to this group
  • Smaller number of possibilities in identifying the
    victim’s record
  • Identifying the victim in this group, with additional
    information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

example of record linkage model

A

Example: Hospital wants to publish the patient records in Table 1 to a research center

  • Research center has access to the external table, Table 2
  • Research center knows that every person with a record in Table 2 has a record in Table 1
  • Joining the two tables on the common attributes Job, Sex, and Age may link the identity of a person to his/her Disease
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is the attribute linkage model

A
  • Adversary may not precisely identify the record of the
    target victim
  • Victim belongs to a group, based on a set of
    Sensitive Attributes
  • Adversary could infer victim’s sensitive values from
    the published data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

example of attribute linkage model

A

Example: Hospital anonymizes the data, Job/Age, into a range, to reduce record linkage

  • Adversary has knowledge that the target victim Emily, is a dancer, is 30 years old, and has a record in the published data
  • Adversary may infer that Emily has HIV with 75% confidence, because 3 out of 4 artists at age 30-35 have HIV
17
Q

what is the table linkage model

A
  • Adversary can confidently infer the presence, or the
    absence, of the victim’s record in the published data
  • If a hospital publishes data with a particular type of
    disease
  • Inferring presence of the victim’s record in the table
    is already damaging
18
Q

example of table linkage model

A

Example: Hospital publishes patient data in Table 3 – table linkage attack on
target victim, Alice
* Adversary is presumed to also have access to external public data in Table 4
* 4/5th or 80% probability that Alice has HIV
* 4 records in Table 3 and 5 records in Table 4 containing, Artist, Female,
[30−35]

19
Q

what is Probabilistic Model

A
  • Does not focus on records, attributes, or tables that
    can be linked to a target victim
  • Compare probability before and after access the
    published data
  • Adversary believes that the probability of identifying
    the target victim’s sensitive information, increases
    after accessing the published data, compared to the
    probability before
20
Q

is the adversary’s knowledge limited to quasi identifiers ?

A

No,

  • Privacy-preserving data publishing has to take
    additional Background Knowledge into consideration
  • Includes, public statistical data, social networks like
    Facebook and LinkedIn, common sense, etc.